Export 969 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is A  [Clear All Filters]
Mishra A, Aloimonos Y, Fermüller C.  2009.  Active segmentation for robotics. IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009. IROS 2009. :3133-3139.
Berthier R, Arjona J, Cukier M.  2009.  Analyzing the process of installing rogue software. :560-565.
Hussein ME, Abd-Almageed W.  2009.  Approximate kernel matrix computation on GPUs forlarge scale learning applications. Proceedings of the 23rd international conference on Supercomputing. :511-512.
Sayeed A, Elsayed T, Garera N, Alexander D, Xu T, Oard D, Yarowsky D, Piatko C.  2009.  Arabic Cross-Document Coreference Resolution. Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$. :357-360.
Saha S, Kianzad V, Schlessman J, Aggarwal G, Bhattacharyya SS, Chellappa R, Wolf W.  2009.  An architectural level design methodology for smart camera applications. International Journal of Embedded Systems. 4(1):83-97.
Albrecht M, Gentry C, Halevi S, Katz J.  2009.  Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
Ananthanarayanan A, Gupta SK, Bruck HA.  2009.  Characterization and control of pin diameter during in-mold assembly of mesoscale revolute joints. North American Manufacturing Research Institute. 37
Bin Tariq M, Mansy A, Feamster N, Ammar M.  2009.  Characterizing VLAN-induced sharing in a campus network. Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. :116-121.
Agrawal M, Doermann D.  2009.  Clutter Noise Removal in Binary Document Images. International Conference on Document Analysis and Recognition (ICDAR '09). :556-560.
Alwen J, Katz J, Lindell Y, Persiano G, Shelat A, Visconti I.  2009.  Collusion-free multiparty computation in the mediated model. Advances in Cryptology-CRYPTO 2009. :524-540.
Klavans JL, Sheffield C, Abels E, Jimmy Lin, Passonneau R, Sidhu T, Soergel D.  2009.  Computational linguistics for metadata building (CLiMB): using text mining for the automatic identification, categorization, and disambiguation of subject terms for image metadata. Multimedia Tools and Applications. 42(1):115-138.
Mayfield J, Alexander D, Dorr BJ, Eisner J, Elsayed T, Finin T, Fink C, Freedman M, Garera N, McNamee P et al..  2009.  Cross-document coreference resolution: A key technology for learning by reading. AAAI Spring Symposium on Learning by Reading and Learning to Read.
Essien K, Vigneau S, Apreleva S, Singh LN, Bartolomei MS, Hannenhalli S.  2009.  CTCF binding site classes exhibit distinct evolutionary, genomic, epigenomic and transcriptomic features. Genome Biology. 10(11):R131-R131.
Bin Tariq M, Motiwala M, Feamster N, Ammar M.  2009.  Detecting network neutrality violations with causal inference. Proceedings of the 5th international conference on Emerging networking experiments and technologies. :289-300.
Zo Y-G, Chokesajjawatee N, Grim C, Arakawa E, Watanabe H, Colwell RR.  2009.  Diversity and Seasonality of Bioluminescent Vibrio Cholerae Populations in Chesapeake Bay. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 75(1):135-146.
Arya S, Malamatos T, Mount D.  2009.  The effect of corners on the complexity of approximate range searching. Discrete & Computational Geometry. 41(3):398-443.
Hussein M, Abd-Almageed W.  2009.  Efficient band approximation of Gram matrices for large scale kernel methods on GPUs. Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis. :31:1–31:10-31:1–31:10.
Shin M, Arbaugh WA.  2009.  Efficient peer-to-Peer lookup in multi-hop wireless networks. KSII Trans. Internet and Information Systems. 3(1):5-25.
Dachman-Soled D, Malkin T, Raykova M, Yung M.  2009.  Efficient Robust Private Set Intersection. Applied Cryptography and Network Security. :125-142.
Reddy D, Agrawal A, Chellappa R.  2009.  Enforcing integrability by error correction using ℓ1-minimization. Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on. :2350-2357.
Agarwal A, Daumé H.  2009.  Exponential family hybrid semi-supervised learning. Proceedings of the 21st International Joint Conference on Artifical Intelligence (IJCAI-09). :974-979.
Zhou S K, Chellappa R, Aggarwal G.  2009.  Face Recognition from Video. The Essential Guide to Video Processing (Second Edition)The Essential Guide to Video Processing (Second Edition). :653-688.
Anwer MB, Feamster N.  2009.  A Fast, Virtualized Data Plane for the NetFPGA. NetFPGA Developers Workshop, Stanford, California. :90-94.
Domke J, Aloimonos Y.  2009.  Image Transformations and Blurring. IEEE Transactions on Pattern Analysis and Machine Intelligence. 31(5):811-823.
Archer A, Bateni MH, Hajiaghayi MT, Karloff H.  2009.  Improved approximation algorithms for prize-collecting Steiner tree and TSP. 2009 50th Annual IEEE Symposium on Foundations of Computer Science. :427-436.